Not a Tech Pro Research member? Sign up for a Free Trial and get access to this content and more for one week.

Data Protection Policy

Originally Published:

Jul 2006

Your organization is subject to a mix of strict legal, ethical, and self-imposed mandates that protect all of the organization's information, records, and data from improper, inappropriate, illegal, and/or illicit use. The security and protection of organization data and employee, partner, and customer privacy are paramount.

The Data Protection Policy exists to ensure all organizational information, records, and data--whether created, transmitted, stored, archived, or otherwise processed on organization systems, servers, and/or networks--are properly obtained, accessed, utilized, transmitted, and archived. This file includes a policy you can customize to meet your needs as well as a risk assessment spreadsheet you can use to judge just how much your organization is at risk by not having this policy in place.

This policy describes measures for preventing workplace violence and outlines the steps your company and staff should take if violence does occur. The download includes a PDF version, along with a Wor...

This policy outlines guidelines and processes for requesting, obtaining, using, and terminating remote access to organization networks, systems, and data. It applies to scenarios where employees conne...

Organizations are using automation to streamline business processes, expedite product development and manufacturing, and free staff from low-level repetitive tasks. This ebook looks at how automation ...

This policy offers guidelines for responding to severe weather activity and other emergencies. The download includes both a PDF version and an RTF document to make customization easier.
The Severe We...

Responses to a 2016 Tech Pro Research survey indicate that AI and machine learning will be a significant area of development for IT in the next few years. Forty-two percent of respondents, most of who...

This sample policy provides a basic outline of the measures an organization should take to protect and maintain the safety of all employees, customers, vendors, and visitors regardless of political af...

Sharing the same 2U chassis as the R820 it replaces, the 4-socket R830 delivers a significant performance boost using the latest Intel Xeon E5-4600 v4 processors with high core counts and faster DDR4 ...

Cisco VPNs are a popular way to allow remote users to access your network. If you deploy one, you need to make sure you've properly secured it. This PDF will go over ten top methods for helping you ma...

Find the best solution to keep your network safe. Learn how our Vendor Selection Checklist: Notebook computers can help you choose the right laptop vendor for your organization with this free sample v...

Creating documentation is time-consuming and boring. It's also essential to maintaining the health and continuity of your Windows network. If your network documentation is weak (or nonexistent), recor...

Reduce stress and speed up resolutions with the easiest command references right at your fingertips. TechRepublic editors have updated and expanded our popular Linux Commands chart and made it downloa...

To efficiently diagnose a connectivity problem, you need a systematic way to examine issues and isolate the cause. This Visio chart steps through wired and wireless connectivity, network configuration...

Windows XP Service Pack 2 (SP2) is a highly complex update with many ramifications for technology professionals. IT pros needing to understand SP2's real impact need look no further than TechRepublic'...

Auditing the activities on your network can be an eye-opening experience if corporate policies and procedures are not strictly enforced and monitored. The Network Auditing Quick Guide will give you so...

Cisco VPNs are a popular way to allow remote users to access your network. If you deploy one, you need to make sure you've properly secured it. This PDF will go over ten top methods for helping you ma...

Find the best solution to keep your network safe. Learn how our Vendor Selection Checklist: Notebook computers can help you choose the right laptop vendor for your organization with this free sample v...

Creating documentation is time-consuming and boring. It's also essential to maintaining the health and continuity of your Windows network. If your network documentation is weak (or nonexistent), recor...

Reduce stress and speed up resolutions with the easiest command references right at your fingertips. TechRepublic editors have updated and expanded our popular Linux Commands chart and made it downloa...

To efficiently diagnose a connectivity problem, you need a systematic way to examine issues and isolate the cause. This Visio chart steps through wired and wireless connectivity, network configuration...

Windows XP Service Pack 2 (SP2) is a highly complex update with many ramifications for technology professionals. IT pros needing to understand SP2's real impact need look no further than TechRepublic'...